Cyber Security Disciplines
In order to work in security and criminal investigation, it is mandatory to wear proof of identity:
– Gray proof of identity:
intended for a person who carries out security work and meets the requirements in Article 5 CPR,
– Blue proof of identity:
intended for a person who may perform security work described for identification for an organization with a limited license,
– Yellow identification:
for a person who carries out private investigative work and meets the requirements of article 10 CPR, proof of identity for special investigating officers, as established by the minister on the basis of the Extraordinary Investigating Officer Decree belonging to a private security organization, or a part thereof, that by the minister has been designated as a category or unit as referred to in Article 142 WbSv.
In order to obtain proof of identity, a certificate of professional competence must be met via ECABO and a screening by the police for reliability requirements.
There are roughly five similarities between security officers:
They are at least in possession of the Security Certificate or are in training for this (before August 2002 this could also have been a General Security Officer or the basic security officer diploma). The Security Guard degree is the compulsory training for security officers at MBO level 2.
They are at least 17 years old.
They were screened by ECABO (with regard to professional competence requirements) and by the police and judiciary (with regard to reliability requirements) before commencement of employment and therefore provide proof of identity.
They all have a job that has to do with safety and security.
They are employed by a company with an ND, BD, PAC or PGW number approved by the Ministry of Justice and fall under the Collective Labor Agreement for Private Security.
The various functions are distinguished by their own character. A mobile security guard, for example, drives car laps, opens and closes business premises and triggers alarms. While a store supervisor is running preventive rounds, it can cause arrests in stores and can carry out arrests. In addition, new functions are regularly created such as the protection of asylum seekers’ centers and polka dot swallowers, often as responses to the changing demand from clients or social society. This means that the security industry is constantly on the move.

This person checks houses, factories, shops and sites in a certain region by periodically checking the outside and inside and is on site when there is an alarm. Increasingly, monitoring and customer-oriented services are also being added, such as personnel monitoring, panic alarms for persons in need of care and assistance with opening and closing of objects susceptible to robbery. The mobile security guard works out of the car, alone and especially in the evening and at night. You can also specialize as an alarm follower.
A mobile security guard can also do alarm follow-up work which consists of following an alarm at a company outside opening hours. He must then check on site what caused the alarm and report on it. This can be a burglary or destruction, or just personnel who have forgotten to switch off the alarm. In case of burglary damage and / or burglary, you take action which consists of, among other things, warning a specified warning address and / or police, fire brigade, glaziers etc.
The so-called collective driving in residential areas and business parks, among other things, are activities that can be associated with a mobile security guard. People drive in a certain neighborhood or business park and thus maintain constant supervision.
Supervisor The shop supervisor runs control rounds in shopping malls or through stores where he is alert to shop theft and order disturbances. Most of them have a fixed object in a team of people who maintain contact with two-way radios. Added tasks include reception work, running opening and closing rounds, and camera surveillance. You are also a host / hostess and a source of information for customers.
security A port security is a security officer who holds the ‘Port security’ certificate. This is required for all security officers working at a location where the ISPS code applies.
ISPS: International Ship and Port Facility Security Code.
The activities of the port security officer include:
Access control, and the checking of identity documents and / or cards of those who want access to the port facility, including the vehicles.
Supervising the port facility, making on-site inspection rounds, which can consist of checking the entrances and roads leading to them, checking the fencing for defects and / or destruction.
Inspecting persons, personal belongings, vehicles and their contents.
Making an inventory of access points that are not in regular use and which must be permanently closed and closed.
for events Many events come together at events, so it is imperative that everything is run in the right direction. From the moment an event starts to the end, there must be a pleasant and safe atmosphere.
The protection of events consists of, among other things
– supervision / control / visiting visitors at the entrance of an event
– personal protection of artists
– stage protection
– supervision of the orderly course of an event
As a dog handler you are often present to support events, make rounds on construction sites, port facilities, or as a combination in, for example, mobile surveillance. Besides the diploma security 2 or abm you must also have a certificate from the KNPV or the NBvD as a dog handler, this is a man / dog statement that shows that you and the dog form a suitable combination.
The dog is considered suitable for security if he has the certificate PH1 or Object from the KNPV or the Security Dog certificate from the NBvD.
security officer The company security service carries out its activities in its own company, whereby security is aimed at both employees and visitors. This ‘own company’ is then usually a larger company with several employees. Instead of hiring a security organization, they arrange the security themselves and therefore have to apply for a corresponding license. A company security service may not perform work for third parties.
centralist The centralist receives alarm messages in the alarm center or control room, processes them with the customer data, answers questions from customers and mobile invigilators and manages invigilators in the event of an alarm response. You can work here in irregular times, generally as a team. Transfer and cooperation are important, as well as good communication skills and a focus on solutions. There is also an increasing demand to work with webcams and other remote cameras.